1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
12

Question # 1

Computers and Technology
2 answers:
Karo-lina-s [1.5K]3 years ago
7 0

Answer:dataset

Explanation:

data set because it is kida a set

IgorC [24]3 years ago
6 0

Answer:

A list, and a deque.

Explanation:

Why am i right? Because i am.. TRUST ME ITS RIGHT YW EVERYONE! :3

You might be interested in
Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
timama [110]

Answer: independence

Explanation:

The AICPA Code of professional Conduct is based on the following concepts which are :

1. responsibilities

2. serve the public interest

3. integrity

4. objectivity and independence

5. due care

6. The scope and nature of services.

3 0
3 years ago
If my_string = "This is MY string!", why does print (my_string[0:7:5]) return "Ti" and not
notka56 [123]

In Python, a string is an array of characters, we can access these characters using index operator []. For example, we have a_string = "Hello World" a_string[0] prints the first character in string ('H').

We can also use index operator to make substrings, for example a_string[0:3] will make a substring with first, second, third and fourth character equal to "Hell".

Now to business

my_string = "This is MY string!"

print(my_string[0:7]) # Prints "This is "

print(my_string[0:7:5]) # Prints "T" then prints the sixth character since we start counting at 0 hence prints "Ti" (note that space is also a character).

Hope this helps.

7 0
3 years ago
Which automated method for VPN connection deployment would work best in combination with Microsoft Intune or Microsoft Endpoint
maks197457 [2]

There are different kinds of automated method for VPN connection deployment. The automated method for VPN connection deployment would work best  is ProfileXML

  • ProfileXML is known to be often used as a delivery methods in Windows PowerShell, Microsoft Endpoint Configuration Manager, and Intune. For an individual to be able to use the ProfileXML VPNv2 CSP setting, one have to construct XML by using the ProfileXML schema.

An individual can configure the Always On VPN client by using the PowerShell, Microsoft Endpoint Configuration Manager, or Intune. They all need an XML VPN profile to configure the appropriate VPN settings.

Learn more from

brainly.com/question/25554117

3 0
2 years ago
A U.S. social security number consists of a string of 9 digits, such as "444422333". Declare a char array named ssn suitable for
tatuchka [14]

Answer:

Since the question expect us to declare a C-string, the solution code is written in C as follows:

  1.    char ssn[9];
  2.    scanf("%s",ssn);

Explanation:

A C-String is a string written in C language. It is an array of characters. To declare a C-string, we use the keyword, <em>char </em>and then followed with the variable name + brackets and the number of characters in the string. For example, we can create a C-String for the SSN number as in Line 1.

To read standard input into the array, we can use C built-in function, <em>scanf(). </em>Just include a string placeholder, %s, and the variable<em> ssn </em>as arguments to <em>scanf()</em>. This will assign the string input by user to variable <em>ssn</em> as C-String.

8 0
3 years ago
The name of a .java file should ______________________________. Always match the name of the Class inside Should always start wi
natita [175]

Answer:

The name of a .java file should <u>always match the name of the class inside.</u>

Explanation:

In Java programming the program written in code editor is first saved with .java extension. The name of this .java file should be same as that of  the class declared inside the file.

This .java file is then compiled and  converted to .class file which contains the java bytecode. This bytecode can then be executed by java virtual machine(JVM).

However it is not always necessary that name of .java files should be same as that of class inside it. The name should be same only when the class inside is declared as public.

In case it is not declared as public one can name .java file different than the actual class name.  

7 0
3 years ago
Other questions:
  • The tone a writer takes is referred to as the writing _____.
    7·2 answers
  • How can supply and demand for different careers affect job stability and income?
    6·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    10·1 answer
  • A function may return a pointer, but the programmer must ensure that the pointer:
    14·1 answer
  • What are expansion cards used for?​
    9·2 answers
  • _ models are non visual ways of communicating how someone thinks about something in the natural world
    12·1 answer
  • ____ is the most widely used language for writing system software because it combines the power of a high-level language with th
    12·1 answer
  • What color mode would you use when designing for web &amp; devices?
    9·1 answer
  • Which of the following shows the correct order of inventions that helped the first computers make calculations?
    9·1 answer
  • How to set Campaign goals?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!